Page 126 / 224 Scroll up to view Page 121 - 125
Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
9-8
Troubleshooting
December 2003, M-10041-01
1.
Press and hold the Default Reset button until the Test LED turns on (about 10 seconds).
2.
Release the Default Reset button and wait for the firewall to reboot.
Problems with Date and Time
The E-mail menu in the Security section displays the current date and time of day. The FVS328
Firewall uses the Network Time Protocol (NTP) to obtain the current time from one of several
Network Time Servers on the Internet. Each entry in the log is stamped with the date and time of
day. Problems with the date and time function can include:
Date shown is January 1, 2000.
Cause: The firewall has not yet successfully reached a Network Time Server. Check that your
Internet access settings are configured correctly. If you have just completed configuring the
firewall, wait at least five minutes and check the date and time again.
Time is off by one hour.
Cause: The firewall does not automatically sense Daylight Savings Time. In the Schedule
menu, select or clear the check box marked Adjust for Daylight Savings Time.
Page 127 / 224
Technical Specifications
A-1
December 2003, M-10041-01
Appendix A
Technical Specifications
This appendix provides technical specifications for the FVS328 ProSafe VPN Firewall with Dial
Back-up.
Network Protocol and Standards Compatibility
Data and Routing Protocols:
TCP/IP, RIP-1, RIP-2, DHCP
PPP over Ethernet (PPPoE)
Power Adapter
North America:
120V, 60 Hz, input
United Kingdom, Australia:
240V, 50 Hz, input
Europe:
230V, 50 Hz, input
Japan:
100V, 50/60 Hz, input
All regions (output):
12 V DC @ 1.2A output, 20W maximum
Physical Specifications
Dimensions:
H: 1.56 in (3.96 cm)
W: 10.0 in (25.4 cm)
D: 9.0 in (17.8 cm)
Weight:
2.72 lb. (1.23 Kg)
Environmental Specifications
Operating temperature:
32
°
-140
°
F (0
°
to 40
°
C)
Operating humidity:
90% maximum relative humidity, noncondensing
Page 128 / 224
Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
A-2
Technical Specifications
December 2003, M-10041-01
Electromagnetic Emissions
Meets requirements of:
FCC Part 15 Class B
VCCI Class B
EN 55 022 (CISPR 22), Class B
Interface Specifications
Local:
10BASE-T or 100BASE-Tx, RJ-45
Internet:
10BASE-T or 100BASE-Tx, RJ-45
Page 129 / 224
Firewall Log Formats
B-1
December 2003, M-10041-01
Appendix B
Firewall Log Formats
Action List
Drop:
Packet dropped by Firewall current inbound or outbound rules.
Reset:
TCP session reset by Firewall.
Forward:
Packet forwarded by Firewall to the next hop based on matching the criteria in
the rules table.
Receive:
Packet was permitted by the firewall rules and modified prior to being
forwarded and/or replied to.
Field List
<DATE><TIME>:
Log's date and time
<EVENT>:
Event is that access the device or access other host via the device
<PKT_TYPE>:
Packet type pass Firewall
<SRC_IP><DST_IP>:
IP address in the packet
<SRC_PORT><DST_PORT>:
Port in the packet
<SRC_INF><DST_INF>:
Include `LAN` and `WAN` (optional)
<ACTION>:
As `Action List` referenced
<DESCRIPTION>:
A complement to the log (optional)
<DIRECTION>:
Inbound and Outbound
<SERVICE>:
Firewall costumed service
Outbound Log
Outgoing packets that match the Firewall rules are logged.
Page 130 / 224
Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
B-2
Firewall Log Formats
December 2003, M-10041-01
The format is:
<DATE> <TIME> <PKT_TYPE> <SRC_IP> <SRC_INF> <DST_IP > <DST_INF>
<ACTION><DESCRIPTION>
[Fri, 2003-12-05 22:19:42] - UDP Packet - Source:172.31.12.233,138 ,WAN -
Destination:172.31.12.255,138 ,LAN [Drop] - [Inbound Default rule match]
[Fri, 2003-12-05 22:35:04] - TCP Packet - Source:172.31.12.156,34239 ,WAN -
Destination:192.168.0.10,21[FTP Control] ,LAN [Forward] - [Inbound Rule(1)
match]
[Fri, 2003-12-05 22:35:11] - UDP Packet - Source:172.31.12.200,138 ,WAN -
Destination:172.31.12.255,138 ,LAN [Forward] - [Inbound Rule(1) not match]
Notes:
SRC_INF = WAN
DST_INF = LAN
DESCRIPTION = "Inbound rule match", "Inbound Default rule match"
PKT_TYPE = "UDP packet", "TCP connection", "ICMP packet"
Inbound Log
Incoming packets that match the Firewall rules are logged.
The format is:
<DATE> <TIME> <PKT_TYPE> <SRC_IP> <SRC_INF> <DST_IP > <DST_INF>
<ACTION><DESCRIPTION>
[Fri, 2003-12-05 22:59:56] - ICMP Packet [Echo Request] - Source:192.168.0.10,LAN
- Destination:192.168.0.1,WAN [Forward] - [Outbound Default rule match]
[Fri, 2003-12-05 23:00:58] - ICMP Packet [Echo Request] - Source:192.168.0.10,LAN
- Destination:172.31.12.200,WAN [Forward] - [Outbound Default rule match]
[Fri, 2003-12-05 23:02:30] - TCP Packet - Source:192.168.0.10,3472 ,LAN -
Destination:216.239.39.99,80[HTTP] ,WAN [Forward] - [Outbound Default rule
match]
Notes:
SRC_INF = LAN
DST_INF = WAN
DESCRIPTION = "Outbound rule match", "Outbound Default rule match"
PKT_TYPE = "UDP packet", "TCP connection", "ICMP packet"
Other IP Traffic
Some special packets matching the Firewall rules, like VPN connection, etc. are logged.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top